RHEL-10-700560 - RHEL 10 must be configured so that the Secure Shell (SSH) daemon performs strict mode checking of home directory configuration files.

Information

If other users have access to modify user-specific SSH configuration files, they may be able to log in to the system as another user.

OpenSSH uses the first occurrence of a keyword it sees, and drop-in files are read in lexicographical order at the start of the configuration. Red Hat recommends using drop-in files rather than changing base configuration files.

Solution

Configure RHEL 10 SSH daemons to perform strict mode checking of home directory configuration files.

In "/etc/ssh/sshd_config.d", create a drop file that will lexicographically precede 50-redhat.conf and add the following line:

StrictModes yes

Restart the SSH service with the following command for the changes to take effect:

$ sudo systemctl restart sshd.service

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_10_V1R1_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-6a., CAT|II, CCI|CCI-002696, Rule-ID|SV-281259r1184759_rule, STIG-ID|RHEL-10-700560, Vuln-ID|V-281259

Plugin: Unix

Control ID: bf8c45796f87bcd17d249928b6d2c9120a0f4ff48a16006ac50063f4ec182a43